Secure Peer-to-Peer Networking: The JXTA Example
IT Professional
JXTA: A Network Programming Environment
IEEE Internet Computing
Does Open Source Improve System Security?
IEEE Software
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Enterprise Strength Security on a JXTA P2P Network
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Crypto-based identifiers (CBIDs): Concepts and applications
ACM Transactions on Information and System Security (TISSEC)
File distribution using a peer-to-peer network: a simulation study
Journal of Systems and Software - Special issue: Performance modeling and analysis of computer systems and networks
Access Control in Peer-to-Peer Collaborative Systems
ICDCSW '05 Proceedings of the First International Workshop on Mobility in Peer-to-Peer Systems - Volume 08
Introducing Secure Peergroups in SP2A
HOT-P2P '05 Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems
Performance evaluation of JXTA communication layers
CCGRID '05 Proceedings of the Fifth IEEE International Symposium on Cluster Computing and the Grid - Volume 01
Performance Evaluation of JXTA Based P2P Distributed Computing System
CIC '06 Proceedings of the 15th International Conference on Computing
An efficient update propagation algorithm for P2P systems
Computer Communications
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks
International Journal of Information Security
Persistent Interoperable Security for JXTA Advertisements
CISIS '08 Proceedings of the 2008 International Conference on Complex, Intelligent and Software Intensive Systems
On scalability of proximity-aware peer-to-peer streaming
Computer Communications
JXTA resource access control by means of advertisement encryption
Future Generation Computer Systems
Securing a Java P2P framework: the JXTA-overlay case
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
XML-based security for JXTA core protocols
International Journal of Autonomic Computing
Modelling and verification of JXTA peer-topeer network protocols
VECoS'11 Proceedings of the Fifth international conference on Verification and Evaluation of Computer and Communication Systems
Hi-index | 0.00 |
JXTA is an open-source initiative that allows to specify a set of collaboration and communication protocols which enable the creation and deployment of peer-to-peer (P2P) applications. This paper provides a survey on its current state regarding the topic of security. The study focuses on the security evaluation of standard peer operations within the JXTA network, highlighting which issues must be seriously taken into account in those applications sensitive to security.